US20070101403A1 - Provisioning a wireless link for a wireless scanner - Google Patents
Provisioning a wireless link for a wireless scanner Download PDFInfo
- Publication number
- US20070101403A1 US20070101403A1 US11/266,828 US26682805A US2007101403A1 US 20070101403 A1 US20070101403 A1 US 20070101403A1 US 26682805 A US26682805 A US 26682805A US 2007101403 A1 US2007101403 A1 US 2007101403A1
- Authority
- US
- United States
- Prior art keywords
- security data
- wireless device
- wireless
- provisioning
- display device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
- G06K7/1093—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing, after transfer of the image of the data-field to an intermediate store, e.g. storage with cathode ray tube
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to wireless scanning devices, and more particularly, to a system or method of provisioning a wireless link for a wireless scanner by automatically generating security data at the beginning of a session, providing security data to an output device, scanning the security data, and using the security data to establish a (preferably secure) wireless connection between the wireless scanner and a host.
- Wireless technology is becoming more and more prevalent.
- One concern with wireless technology is the security of the information that is being transmitted. This is because the information is being transmitted over radio frequency (RF) signals that are accessible to anyone with a proper reception device.
- RF radio frequency
- many wireless protocols e.g., Bluetooth, ZigBee, WLAN, etc.
- Bluetooth, ZigBee, WLAN, etc. have implemented security procedures that can be activated on command.
- Bluetooth uses a personal identification number (PIN) to authenticate a secondary device.
- PIN personal identification number
- the PIN of a primary device is manually provided to the secondary device (e.g., by way of a keyboard).
- the primary device then transmits a “challenge” that is based (in part) on the PIN.
- the secondary device transmits a “response” that is based (in part) on the “challenge” and the PIN. If the “response” is proper (or authenticated), the secondary device is authenticated, and a relatively secure wireless link is established.
- the PIN can be used to generate an encryption key, which is used to encrypt (or encode) data that is transmitted over the link. Similar security procedures are found in other wireless protocols.
- the present invention provides a system and method of provisioning a wireless link for a wireless scanner.
- Embodiments of the present invention operate in accordance a primary wireless device (e.g., a host) adapted to generate security data at the beginning of a session, an output device (e.g., a display, printer, etc.) electrically connected to the primary wireless device, and at least one secondary device (e.g., a scanner) adapted to communicate with the primary wireless device over a wireless link.
- a primary wireless device e.g., a host
- an output device e.g., a display, printer, etc.
- at least one secondary device e.g., a scanner
- the term “session” is used herein to connote a (static or dynamic) period of time.
- the session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc.
- the session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc.
- the session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.).
- security data is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link.
- PIN personal identification number
- Similar (security) data is used in conjunction with other wireless protocols.
- a host in a first embodiment, includes a provisioning application connected to a first wireless device and adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device, and (iii) display the security data on a display.
- the provisioning application is further adapted to (i) store the security data in a memory device, (ii) display instructional information on the display, and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
- a scanner in a second embodiment of the present invention, includes a scanning application connected to a second wireless device and adapted to (i) acquire encoded data (e.g., a barcode, etc.), (ii) extract the security data from the encoded data, (iii) identify the security data as being applicable to the second wireless device, and (iv) provide the security data to the second wireless device.
- the scanning application is further adapted to store the security data in a memory device.
- the scanning application may use the command(s) to identify the security data as being applicable to the second wireless device and/or the second wireless device may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
- a wireless link e.g., for authentication, encryption, etc.
- the scanning application is further adapted to acquire additional encoded data from a third device (e.g., printer, etc.) and provide the additional data to the host over a secure wireless link.
- the additional encoded data is used by the host to establish a connection with the third device.
- FIG. 1 illustrates a system for provisioning a wireless link between a host and a scanner in accordance with one embodiment of the present invention
- FIG. 2 illustrates a block diagram of a host and a block diagram of a scanner (see FIG. 1 ) in accordance with embodiments of the present invention
- FIG. 3 illustrates a method of provisioning a wireless link in accordance with one embodiment of the present invention.
- the present invention provides a system and method of provisioning a wireless link for a wireless scanner.
- like element numerals are used to describe like elements illustrated in one or more figures.
- the present invention is not so limited, and is further applicable to all wireless protocols including, but not limited to, WiFi, WLAN, ZigBee, and all other wireless protocols generally known to those skilled in the art.
- Embodiments of the present invention operate in accordance with an output device (e.g., display, printer, etc.), a primary wireless device (e.g., a host) connected to the output device, and at least one secondary wireless device (e.g., a scanner).
- FIG. 1 illustrates a system for provisioning a wireless link in accordance with one embodiment of the present invention.
- the system 10 includes a host 100 , a display 110 electrically connected to the host 100 , and a scanner 120 adapted to communicate with the host 100 over a wireless link.
- the displays discussed and depicted herein include, but are not limited to, computer monitors (e.g., CRTs, flat-panels, etc.), small graphic displays (e.g., 240 ⁇ 320, etc.), alphanumeric displays, and all other display devices generally known to those skilled in the art.
- the hosts discussed and depicted herein include, but are not limited to, personal computers (desktops, laptops, etc.), hand-held computers (e.g., PDAs, etc.) and all other computing and/or processing devices generally known to those skilled in the art.
- the wireless scanners discussed and depicted herein include, but are not limited to, wireless barcode scanners, wireless RFID scanners, and all other wireless optical, electrical and/or radio frequency scanning devices generally known to those skilled in the art.
- the host 100 is adapted to generate security data at the beginning of a session.
- the term “session” is used herein to connote a (static or dynamic) period of time.
- the session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc.
- the session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc.
- the session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.).
- security data is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link.
- PIN personal identification number
- Similar (security) data is used in conjunction with other wireless protocols.
- the security data is then displayed on the display 110 .
- the security data is displayed in the form of at least one barcode.
- the host 100 in this embodiment, is adapted to (i) generate security data, (ii) generate at least one barcode that includes at least the security data, and (iii) display the at least one barcode on the display 110 .
- the host 100 is further adapted to generate a barcode(s) that includes both the security data and at least one provisioning command.
- the provisioning command is used by the scanner 120 (or components included therein) to identify the security data as data that is applicable to a wireless device or can be used to provision a wireless link.
- the host 100 is further adapted to display instructional information on the display.
- the display 110 includes instructional information (e.g., “Provisioning Procedures 1 ) Scan barcode 1 . . . ”) and a plurality of barcodes (e.g., barcodes 1 and 2 ) (i.e., 112 ).
- the barcodes include security data and may also include at least one provisioning command and/or additional information.
- the wireless device 120 is then used to scan an image of the barcode(s) on the display 110 .
- the security data is then extracted from the barcode(s) and used to provision a wireless link between the scanner 120 and the host 100 .
- the security data e.g., a PIN
- the security data may be used to generate a “response” to a “challenge” transmitted by the host 100 . It may also be used to facilitate encryption.
- FIG. 2 illustrates a block diagram of the host and a block diagram of the scanner in accordance with embodiments of the present invention.
- the host includes a first wireless device 102 , a provisioning application 104 and a memory device 106 .
- the provisioning application 104 is adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device 102 , and (iii) display the security data on the display 110 .
- the provisioning application is further adapted to (i) store the security data in the memory device 106 , (ii) display instructional information on the display 110 , and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
- the scanner 120 includes a second wireless device 122 , a scanning application 124 and a memory device 120 .
- the scanning application 124 is adapted to (i) acquire barcode data, (ii) extract (e.g., decode) the security data from the barcode data, (iii) identify the security data as being applicable to the second wireless device, and (iii) provide the security data to the second wireless device.
- the scanning application 124 is further adapted to store the security data in the memory device 126 .
- the scanning application 124 may use the command(s) to identify the security data as being applicable to the second wireless device 122 and/or the second wireless device 122 may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
- a wireless link e.g., for authentication, encryption, etc.
- additional security data is used to provision a wireless link between the host 100 and a third device (e.g., computer, smart printer, etc.).
- the third device 300 includes a third wireless device 302 , a second provisioning application 304 and a memory 306 .
- the provisioning application 304 is adapted to (i) generate additional security data (e.g., at the beginning of a session, etc.), (ii) provide the additional security data to the third wireless device 302 , and (iii) display or print the additional security data.
- the second provisioning application 304 is further adapted to (i) store the additional security data in the memory device 306 , (ii) display or print instructional information, and/or (iii) generate a barcode(s) that includes the additional security data, at least one provisioning command, and/or additional data.
- the scanner application 124 is further adapted to (i) acquire the additional security data (e.g., by scanning a barcode that includes the additional security data, etc.) and (ii) provide the additional security data to the second wireless device 122 .
- the second wireless device 122 is then adapted to provide the additional security data to the first wireless device 102 via the wireless link 200 .
- the additional security data is then used to provision a wireless link 400 between the first wireless device 102 and the third wireless device 302 .
- the scanning application 124 may use the command(s) to identify the additional security data as being applicable to the second wireless device 122 , the second wireless device 122 may use the command(s) to identify the additional security data as being applicable to the first wireless device 102 , and/or the first wireless device 102 may use the command(s) to identify the additional security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
- a wireless link e.g., for authentication, encryption, etc.
- the wireless devices include, but are not limited to, Bluetooth transceivers and all other wireless reception and/or transmission devices generally known to those skilled in the art.
- the memory devices e.g., 106 , 126 depicted and discussed herein include, but are not limited to, RAM, cache memory, flash memory, magnetic disks, optical disks, removable disks, SCSI disks, IDE hard drives, registers and all other data storage devices (and combinations thereof, such as RAID devices) generally known to those skilled in the art. It should further be appreciated that the number, locations and types of components depicted in FIG.
- a host that includes additional or fewer components (e.g., a plurality of memory devices, a user interface, etc.) is considered within the spirit and scope of the present invention.
- the provisioning application may exist as a single application or as multiple applications operating locally on and/or remotely to the host.
- a provisioning system that includes a host, a server in communication with the host, and at least a portion of a provisioning application operating on the server, is considered within the spirit and scope of the present invention.
- a session (e.g., a first session, etc.) is identified at step 400 .
- a session may begin at a pre-determined time, in response to the reception of user-defined data (e.g., data indicating that a new (or different) scanner is being use, data indicating that a “provisioning” key or icon has been selected, etc.), and/or in response to a particular event.
- user-defined data e.g., data indicating that a new (or different) scanner is being use, data indicating that a “provisioning” key or icon has been selected, etc.
- security data is automatically generated.
- the security data is generated at the beginning of or during the session.
- the security data is provided to a first wireless device and displayed on a display device.
- the first wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “challenge,” etc.).
- the security data is encoded (e.g., in a barcode, etc.) prior to being displayed on the display device.
- An image of the security data (or an encoded version thereof) is then scanned at step 408 and used to establish a wireless connection between the first wireless device and a second wireless device at step 410 .
- the second wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “response” to the “challenge,” etc.).
- the wireless link can then be used to exchange data at step 412 until the session has expired or a new session has begun.
- security data e.g., new security data
- security data is automatically generated at step 402 , and the process begins again.
- FIG. 5 A method of provisioning a wireless link in accordance with a second embodiment of the present invention is illustrated in FIG. 5 .
- additional security data is automatically generated at step 500 and provided to a third wireless device at step 502 .
- the additional security data is then displayed or printed (e.g., on a display, by a printer, by a smart printer, etc.).
- An image of the additional security data, as displayed or printed, is then scanned at step 506 and provided to a second wireless device at step 508 .
- the additional security data is provided to a first wireless device via a first wireless link (e.g., between the first wireless device and the second wireless device) and used to provision a second wireless link (e.g., between the first wireless device and the third wireless device).
- a first wireless link e.g., between the first wireless device and the second wireless device
- a second wireless link e.g., between the first wireless device and the third wireless device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Toxicology (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A system and method of provisioning a wireless link for a wireless scanner is provided. Embodiments of the present invention operate in accordance with a primary wireless device adapted to generate security data at the beginning of a session, an output device electrically connected to the primary wireless device, and a secondary wireless device adapted to communicate with the primary wireless device over a wireless link. In one embodiment of the present invention, the primary wireless device includes a provisioning application connected to a first wireless device and adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device, and (iiii) provide the security data to the output device. In alternate embodiments of the present invention, the provisioning application is further adapted to (i) store the security data in a memory device, (ii) provide instructional information to the output device, and/or (ii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data. In another embodiment of the present invention, the second wireless device includes a scanning application connected to a second wireless device and adapted to (i) acquire the security data from the output device, (ii) identify the security data as being applicable to the second wireless device, and (iii) provide the security data to the second wireless device. In an alternate embodiment of the present invention, the scanning application is further adapted to store the security data in a memory device.
Description
- 1. Field of the Invention
- The present invention relates to wireless scanning devices, and more particularly, to a system or method of provisioning a wireless link for a wireless scanner by automatically generating security data at the beginning of a session, providing security data to an output device, scanning the security data, and using the security data to establish a (preferably secure) wireless connection between the wireless scanner and a host.
- 2. Description of Related Art
- Wireless technology is becoming more and more prevalent. One concern with wireless technology, however, is the security of the information that is being transmitted. This is because the information is being transmitted over radio frequency (RF) signals that are accessible to anyone with a proper reception device. In response to this concern, many wireless protocols (e.g., Bluetooth, ZigBee, WLAN, etc.) have implemented security procedures that can be activated on command.
- Bluetooth, for example, uses a personal identification number (PIN) to authenticate a secondary device. Specifically, the PIN of a primary device is manually provided to the secondary device (e.g., by way of a keyboard). The primary device then transmits a “challenge” that is based (in part) on the PIN. The secondary device then transmits a “response” that is based (in part) on the “challenge” and the PIN. If the “response” is proper (or authenticated), the secondary device is authenticated, and a relatively secure wireless link is established. If additional security is required, the PIN can be used to generate an encryption key, which is used to encrypt (or encode) data that is transmitted over the link. Similar security procedures are found in other wireless protocols.
- One drawback of these security procedures is that they are based on PINs (or codes), which like any other password, should be changed frequently in order to ensure a certain level of security. Thus, a procedure needs to be in place in which new PINs are identified on a routine basis.
- Another drawback, which only exacerbates the first drawback, is that the new PINs need to be entered manually (e.g., by way of a keyboard). This is especially problematic in a manufacturing or shipping environment, where wireless devices (e.g., wireless scanners, etc.) are used in numbers and frequently (if not continuously). If the security procedures, which require individuals to frequently (i) identify a number of new PINs and (ii) manually entering the new PINs into a number of wireless devices, becomes too cumbersome, the procedures will either be disregarded or they will be followed haphazardly. For example, the PINs may end up being relatively simple (e.g., “0000,” “123456”), repetitive, identified and entered less frequently, or never changed.
- Accordingly, it would be desirable to provide a system and method of provisioning a wireless link between a host and a wireless device, preferably a wireless scanner, that overcomes at least one of these drawbacks.
- The present invention provides a system and method of provisioning a wireless link for a wireless scanner. Embodiments of the present invention operate in accordance a primary wireless device (e.g., a host) adapted to generate security data at the beginning of a session, an output device (e.g., a display, printer, etc.) electrically connected to the primary wireless device, and at least one secondary device (e.g., a scanner) adapted to communicate with the primary wireless device over a wireless link.
- The term “session” is used herein to connote a (static or dynamic) period of time. The session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc. The session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc. The session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.). The term “security data” is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link. For example, with respect to the Bluetooth protocol, a personal identification number (PIN) is used for authentication and encryption, and would therefore constitute security data. Similar (security) data is used in conjunction with other wireless protocols.
- In a first embodiment of the present invention, a host includes a provisioning application connected to a first wireless device and adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device, and (iii) display the security data on a display. In alternate embodiments of the present invention, the provisioning application is further adapted to (i) store the security data in a memory device, (ii) display instructional information on the display, and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
- In a second embodiment of the present invention, a scanner includes a scanning application connected to a second wireless device and adapted to (i) acquire encoded data (e.g., a barcode, etc.), (ii) extract the security data from the encoded data, (iii) identify the security data as being applicable to the second wireless device, and (iv) provide the security data to the second wireless device. In an alternate embodiment of the present invention, the scanning application is further adapted to store the security data in a memory device. If the barcode(s) includes a provisioning command(s), the scanning application may use the command(s) to identify the security data as being applicable to the second wireless device and/or the second wireless device may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
- In a third embodiment of the present invention, the scanning application is further adapted to acquire additional encoded data from a third device (e.g., printer, etc.) and provide the additional data to the host over a secure wireless link. In one embodiment of the present invention, the additional encoded data is used by the host to establish a connection with the third device.
- A more complete understanding of a system and method of provisioning a wireless link for a wireless scanner will be afforded to those skilled in the art, as well as a realization of additional advantages and objects thereof, by a consideration of the following detailed description of the preferred embodiment. Reference will be made to the appended sheets of drawings which will first be described briefly.
-
FIG. 1 illustrates a system for provisioning a wireless link between a host and a scanner in accordance with one embodiment of the present invention; -
FIG. 2 illustrates a block diagram of a host and a block diagram of a scanner (seeFIG. 1 ) in accordance with embodiments of the present invention; and -
FIG. 3 illustrates a method of provisioning a wireless link in accordance with one embodiment of the present invention. - The present invention provides a system and method of provisioning a wireless link for a wireless scanner. In the detailed description that follows, like element numerals are used to describe like elements illustrated in one or more figures. It should be appreciated that while embodiments of the present invention are described herein in term of a Bluetooth protocol, the present invention is not so limited, and is further applicable to all wireless protocols including, but not limited to, WiFi, WLAN, ZigBee, and all other wireless protocols generally known to those skilled in the art.
- Embodiments of the present invention operate in accordance with an output device (e.g., display, printer, etc.), a primary wireless device (e.g., a host) connected to the output device, and at least one secondary wireless device (e.g., a scanner).
FIG. 1 illustrates a system for provisioning a wireless link in accordance with one embodiment of the present invention. Specifically, thesystem 10 includes ahost 100, adisplay 110 electrically connected to thehost 100, and ascanner 120 adapted to communicate with thehost 100 over a wireless link. It should be appreciated that the displays discussed and depicted herein include, but are not limited to, computer monitors (e.g., CRTs, flat-panels, etc.), small graphic displays (e.g., 240×320, etc.), alphanumeric displays, and all other display devices generally known to those skilled in the art. It should also be appreciated that the hosts discussed and depicted herein include, but are not limited to, personal computers (desktops, laptops, etc.), hand-held computers (e.g., PDAs, etc.) and all other computing and/or processing devices generally known to those skilled in the art. It should further be appreciated that the wireless scanners discussed and depicted herein include, but are not limited to, wireless barcode scanners, wireless RFID scanners, and all other wireless optical, electrical and/or radio frequency scanning devices generally known to those skilled in the art. - In accordance with a first embodiment of the present invention, the
host 100 is adapted to generate security data at the beginning of a session. The term “session” is used herein to connote a (static or dynamic) period of time. The session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc. The session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc. The session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.). The term “security data” is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link. For example, with respect to the Bluetooth protocol, a personal identification number (PIN) is used for authentication and encryption, and therefore constitute security data. Similar (security) data is used in conjunction with other wireless protocols. - The security data is then displayed on the
display 110. In a preferred embodiment of the present invention, the security data is displayed in the form of at least one barcode. In other words, thehost 100, in this embodiment, is adapted to (i) generate security data, (ii) generate at least one barcode that includes at least the security data, and (iii) display the at least one barcode on thedisplay 110. In another embodiment of the present invention, thehost 100 is further adapted to generate a barcode(s) that includes both the security data and at least one provisioning command. The provisioning command is used by the scanner 120 (or components included therein) to identify the security data as data that is applicable to a wireless device or can be used to provision a wireless link. In another embodiment of the present invention, thehost 100 is further adapted to display instructional information on the display. Such an embodiment is exemplified inFIG. 1 , where thedisplay 110 includes instructional information (e.g., “Provisioning Procedures 1)Scan barcode 1 . . . ”) and a plurality of barcodes (e.g., barcodes 1 and 2) (i.e., 112). The barcodes include security data and may also include at least one provisioning command and/or additional information. - The
wireless device 120 is then used to scan an image of the barcode(s) on thedisplay 110. The security data is then extracted from the barcode(s) and used to provision a wireless link between thescanner 120 and thehost 100. For example, if thescanner 120 includes Bluetooth technology, the security data (e.g., a PIN) may be used to generate a “response” to a “challenge” transmitted by thehost 100. It may also be used to facilitate encryption. -
FIG. 2 illustrates a block diagram of the host and a block diagram of the scanner in accordance with embodiments of the present invention. Specifically, in accordance with one embodiment of the present invention, the host includes afirst wireless device 102, aprovisioning application 104 and amemory device 106. Theprovisioning application 104 is adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to thefirst wireless device 102, and (iii) display the security data on thedisplay 110. In alternate embodiments of the present invention, the provisioning application is further adapted to (i) store the security data in thememory device 106, (ii) display instructional information on thedisplay 110, and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data. - In accordance with another embodiment of the present invention, the
scanner 120 includes asecond wireless device 122, ascanning application 124 and amemory device 120. Thescanning application 124 is adapted to (i) acquire barcode data, (ii) extract (e.g., decode) the security data from the barcode data, (iii) identify the security data as being applicable to the second wireless device, and (iii) provide the security data to the second wireless device. In an alternate embodiment of the present invention, thescanning application 124 is further adapted to store the security data in thememory device 126. If a provisioning command(s) is provided, thescanning application 124 may use the command(s) to identify the security data as being applicable to thesecond wireless device 122 and/or thesecond wireless device 122 may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.). - In accordance with another embodiment of the present invention, as shown in
FIG. 3 , additional security data is used to provision a wireless link between thehost 100 and a third device (e.g., computer, smart printer, etc.). Specifically, thethird device 300 includes athird wireless device 302, a second provisioning application 304 and amemory 306. The provisioning application 304 is adapted to (i) generate additional security data (e.g., at the beginning of a session, etc.), (ii) provide the additional security data to thethird wireless device 302, and (iii) display or print the additional security data. In an alternate embodiment of the present invention, the second provisioning application 304 is further adapted to (i) store the additional security data in thememory device 306, (ii) display or print instructional information, and/or (iii) generate a barcode(s) that includes the additional security data, at least one provisioning command, and/or additional data. - The
scanner application 124, in accordance with this embodiment, is further adapted to (i) acquire the additional security data (e.g., by scanning a barcode that includes the additional security data, etc.) and (ii) provide the additional security data to thesecond wireless device 122. Thesecond wireless device 122 is then adapted to provide the additional security data to thefirst wireless device 102 via thewireless link 200. The additional security data is then used to provision awireless link 400 between thefirst wireless device 102 and thethird wireless device 302. If a provisioning command(s) is provided, thescanning application 124 may use the command(s) to identify the additional security data as being applicable to thesecond wireless device 122, thesecond wireless device 122 may use the command(s) to identify the additional security data as being applicable to thefirst wireless device 102, and/or thefirst wireless device 102 may use the command(s) to identify the additional security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.). - It should be appreciated that the wireless devices (e.g., 102, 122) depicted and discussed herein include, but are not limited to, Bluetooth transceivers and all other wireless reception and/or transmission devices generally known to those skilled in the art. It should also be appreciated that the memory devices (e.g., 106, 126) depicted and discussed herein include, but are not limited to, RAM, cache memory, flash memory, magnetic disks, optical disks, removable disks, SCSI disks, IDE hard drives, registers and all other data storage devices (and combinations thereof, such as RAID devices) generally known to those skilled in the art. It should further be appreciated that the number, locations and types of components depicted in
FIG. 2 are not limitations of the present invention, and are merely provided to illustrate the environment in which the present invention may operate. Thus, for example, a host that includes additional or fewer components (e.g., a plurality of memory devices, a user interface, etc.) is considered within the spirit and scope of the present invention. It should further be appreciated that the provisioning application may exist as a single application or as multiple applications operating locally on and/or remotely to the host. Thus, for example, a provisioning system that includes a host, a server in communication with the host, and at least a portion of a provisioning application operating on the server, is considered within the spirit and scope of the present invention. - A method of provisioning a wireless link in accordance with one embodiment of the present invention is illustrated in
FIG. 4 . Specifically, a session (e.g., a first session, etc.) is identified atstep 400. As previously discussed, a session may begin at a pre-determined time, in response to the reception of user-defined data (e.g., data indicating that a new (or different) scanner is being use, data indicating that a “provisioning” key or icon has been selected, etc.), and/or in response to a particular event. Atstep 402, security data is automatically generated. In preferred embodiments of the present invention, the security data is generated at the beginning of or during the session. Atsteps - An image of the security data (or an encoded version thereof) is then scanned at
step 408 and used to establish a wireless connection between the first wireless device and a second wireless device atstep 410. For example, the second wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “response” to the “challenge,” etc.). The wireless link can then be used to exchange data atstep 412 until the session has expired or a new session has begun. Atstep 414, and at that time, security data (e.g., new security data) is automatically generated atstep 402, and the process begins again. - A method of provisioning a wireless link in accordance with a second embodiment of the present invention is illustrated in
FIG. 5 . Specifically, additional security data is automatically generated atstep 500 and provided to a third wireless device atstep 502. Atstep 504, the additional security data is then displayed or printed (e.g., on a display, by a printer, by a smart printer, etc.). An image of the additional security data, as displayed or printed, is then scanned atstep 506 and provided to a second wireless device atstep 508. Atsteps - Having thus described several embodiments of a system and method of provisioning a secure wireless link for a wireless scanner, it should be apparent to those skilled in the art that certain advantages of the within described system and method have been achieved. It should also be appreciated that various modifications, adaptations, and alternative embodiments thereof may be made within the scope and spirit of the present invention. The invention is solely defined by the following claims.
Claims (23)
1. A system for provisioning a wireless connection between a host and a scanner, comprising:
a display device;
a host connected to said display device and comprising a first wireless device and a provisioning application, said provisioning application being adapted to:
automatically generate security data at the beginning of a session;
provide said security data to said first wireless device; and
display said security data on said display device; and
a scanner comprising a second wireless device and a scanning application, said scanning application being adapted to:
scan an image of said security data on said display device; and
provide said security data to said second wireless device, said security data being used by said first and second wireless devices to establish a secure wireless connection therebetween.
2. The system of claim 1 , wherein said host further comprises a memory device and said provisioning application is further adapted to store said security data in said memory device.
3. The system of claim 1 , wherein said first and second wireless devices are Bluetooth transceivers and said security data comprises a personal identification number (PIN).
4. The system of claim 1 , wherein said session comprises a user-defined period of time.
5. The system of claim 1 , wherein said provisioning application is further adapted to create said session in response to receiving user-defined data.
6. The system of claim 1 , wherein said provisioning application is further adapted to generate at least one barcode that includes said security data and to display said security data on said display device by displaying said at least one barcode on said display device.
7. The system of claim 3 , wherein said provisioning application is further adapted to display at least one provisioning command on said display device, an image of said at least one provisioning command being scanned by said scanner and used to identify said security data as said PIN.
8. The system of claim 7 , wherein said provisioning application is further adapted to display instructional information on said display device, said instructional information instructing a user to scan said image of said security data on said display device.
9. The system of claim 1 , wherein said scanner further comprises a memory device, said scanning application being further adapted to store said security data in said memory device.
10. The system of claim 1 , wherein said security data is used by said first wireless device to authenticate said second wireless device.
11. The system of claim 1 , wherein said security data is used to encrypt data that is transmitted at least unidirectionally over said secure wireless connection.
12. The system of claim 1 , further comprising a third wireless device and a second provisioning application adapted to (i) automatically generate additional security data, (ii) provide said additional security data to said third wireless device, and (iii) print said additional security data.
13. The system of claim 13 , wherein said scanning application is further adapted to scan an image of said additional security data and provide said additional security data to said second wireless device, said additional security data being provided to said first wireless device via said secure wireless connection and used to establish a second wireless connection between said first wireless device and said third wireless device.
14. A method of provisioning a wireless connection between a host and a scanner, comprising:
automatically generating security data that corresponds to a session;
providing said security data to a first wireless device, said first wireless device being in communication with said host;
displaying said security data on a display device;
acquiring said security data by scanning an image of said security data on said display device;
identifying said security data as being applicable to a second wireless device, said second wireless device being in communication with said scanner;
providing said security data to said second wireless device; and
using said security data to establish a secure wireless connection between said first and second wireless devices.
15. The method of claim 14 , wherein said step of automatically generating security data further comprises automatically generating a personal identification number (PIN), said PIN being used, at least in part, by said first wireless device to authenticate said second wireless device.
16. The method of claim 14 , wherein said step of automatically generating security data further comprises automatically generating a personal identification number (PIN), said PIN being use, at least in part, to encrypt data that is transmitted at least unidirectionally over said secure wireless connection.
17. The method of claim 14 , wherein said step of automatically generating security data that corresponds to a session further comprises automatically generating said security data that corresponds to a user-defined session.
18. The method of claim 14 , further comprising the step of receiving user-defined data, wherein said step of automatically generating security data that corresponds to a session further comprises automatically generating said security data that corresponds to the reception of said user-defined data.
19. The method of claim 14 , wherein said step of displaying said security data on a display device further comprises generating at least one barcode that includes said security data and displaying said at least one barcode on said display device.
20. The method of claim 14 , wherein said steps of displaying said security data on a display device and identifying said security data as being applicable to a second wireless device further comprises:
generating at least one barcode that includes said security data and at least one provisioning command;
displaying said at least one barcode on said display device; and
using said at least one provisioning command to identify said security data as being applicable to said second wireless device.
21. The method of claim 20 , wherein said step of displaying said security data on a display device further comprises displaying instructional information on said display device that instructs a user to scan an image of said at least one barcode on said display device.
22. The method of claim 14 , further comprising:
automatically generating additional security data;
providing said additional security data to a third wireless device;
printing said additional security data on a substantially flat substrate;
acquiring said additional security by scanning an image of said additional security data on said substantially flat substrate;
providing said additional security data to said first wireless device via said secure wireless connection; and
using said additional security data to establish a second secure wireless connection between said first and third wireless devices.
23. A host connected to a display device, comprising:
a Bluetooth transceiver; and
a provisioning application connected to said Bluetooth transceiver, said provisioning application being adapted to:
automatically generate a personal identification number (PIN) at the beginning of a session;
providing said PIN to said Bluetooth transceiver, said Bluetooth transceiver using said PIN to generate a challenge;
generating at least one barcode that includes at least said PIN;
displaying said at least one barcode on said display device;
wherein said PIN is used by a scanner to generate a response to said challenge, which is then used by said Bluetooth transceiver to authenticate said scanner.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/266,828 US20070101403A1 (en) | 2005-11-03 | 2005-11-03 | Provisioning a wireless link for a wireless scanner |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/266,828 US20070101403A1 (en) | 2005-11-03 | 2005-11-03 | Provisioning a wireless link for a wireless scanner |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070101403A1 true US20070101403A1 (en) | 2007-05-03 |
Family
ID=37998169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/266,828 Abandoned US20070101403A1 (en) | 2005-11-03 | 2005-11-03 | Provisioning a wireless link for a wireless scanner |
Country Status (1)
Country | Link |
---|---|
US (1) | US20070101403A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100259549A1 (en) * | 2009-04-08 | 2010-10-14 | Research In Motion Limited | Systems, devices, and methods for displaying a barcode at a computing device |
US20110081860A1 (en) * | 2009-10-02 | 2011-04-07 | Research In Motion Limited | Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner |
US20110210171A1 (en) * | 2010-02-26 | 2011-09-01 | Research In Motion Limited | Methods and devices for transmitting and receiving data used to activate a device to operate with a server |
EP2364043A1 (en) | 2010-02-26 | 2011-09-07 | Research In Motion Limited | Methods and devices for transmitting and receiving data used to activate a device to operate with a server |
US20120084846A1 (en) * | 2010-09-30 | 2012-04-05 | Google Inc. | Image-based key exchange |
US20120322382A1 (en) * | 2010-02-25 | 2012-12-20 | Olympus Corporation | Portable wireless terminal, wireless terminal device, and wireless communication system |
US8463239B1 (en) * | 2011-02-11 | 2013-06-11 | Sprint Communications Company L.P. | Secure reconfiguration of wireless communication devices |
US20140366101A1 (en) * | 2012-02-09 | 2014-12-11 | Sharp Kabushiki Kaisha | Informaton processing system, information processing device, and communication connection method |
US20160314294A1 (en) * | 2015-04-24 | 2016-10-27 | Hand Held Products, Inc. | Secure unattended network authentication |
CN108108595A (en) * | 2017-12-29 | 2018-06-01 | 晨星半导体股份有限公司 | The method and system authorized to the software in electronic equipment |
BE1028540B1 (en) * | 2020-08-27 | 2022-10-05 | Zebra Technologies | METHODS AND SYSTEMS FOR SETTING UP A BI-DIRECTIONAL COMMUNICATION LINK BETWEEN A HOST DEVICE AND A BARCODE READER |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030152041A1 (en) * | 2002-01-10 | 2003-08-14 | Falk Herrmann | Protocol for reliable, self-organizing, low-power wireless network for security and building automation systems |
US20050140498A1 (en) * | 2000-12-11 | 2005-06-30 | Bastian William A.Ii | Inventory system with barcode display |
US20050266826A1 (en) * | 2004-06-01 | 2005-12-01 | Nokia Corporation | Method for establishing a security association between a wireless access point and a wireless node in a UPnP environment |
US20060267753A1 (en) * | 2005-05-31 | 2006-11-30 | Hussey Robert M | Bar coded wristband |
-
2005
- 2005-11-03 US US11/266,828 patent/US20070101403A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050140498A1 (en) * | 2000-12-11 | 2005-06-30 | Bastian William A.Ii | Inventory system with barcode display |
US20030152041A1 (en) * | 2002-01-10 | 2003-08-14 | Falk Herrmann | Protocol for reliable, self-organizing, low-power wireless network for security and building automation systems |
US20050266826A1 (en) * | 2004-06-01 | 2005-12-01 | Nokia Corporation | Method for establishing a security association between a wireless access point and a wireless node in a UPnP environment |
US20060267753A1 (en) * | 2005-05-31 | 2006-11-30 | Hussey Robert M | Bar coded wristband |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8720780B2 (en) | 2009-04-08 | 2014-05-13 | Blackberry Limited | Systems, devices, and methods for displaying a barcode at a computing device |
US9349088B2 (en) | 2009-04-08 | 2016-05-24 | Blackberry Limited | Systems, devices, and methods for displaying a barcode at a computing device |
US20100259549A1 (en) * | 2009-04-08 | 2010-10-14 | Research In Motion Limited | Systems, devices, and methods for displaying a barcode at a computing device |
US20110081860A1 (en) * | 2009-10-02 | 2011-04-07 | Research In Motion Limited | Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner |
US9185735B2 (en) | 2009-10-02 | 2015-11-10 | Blackberry Limited | Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner |
US8879994B2 (en) | 2009-10-02 | 2014-11-04 | Blackberry Limited | Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner |
US20120322382A1 (en) * | 2010-02-25 | 2012-12-20 | Olympus Corporation | Portable wireless terminal, wireless terminal device, and wireless communication system |
EP2364043A1 (en) | 2010-02-26 | 2011-09-07 | Research In Motion Limited | Methods and devices for transmitting and receiving data used to activate a device to operate with a server |
US9105023B2 (en) * | 2010-02-26 | 2015-08-11 | Blackberry Limited | Methods and devices for transmitting and receiving data used to activate a device to operate with a server |
US20110210171A1 (en) * | 2010-02-26 | 2011-09-01 | Research In Motion Limited | Methods and devices for transmitting and receiving data used to activate a device to operate with a server |
US8855300B2 (en) * | 2010-09-30 | 2014-10-07 | Google Inc. | Image-based key exchange |
US8861724B2 (en) * | 2010-09-30 | 2014-10-14 | Google Inc. | Image-based key exchange |
US20120084571A1 (en) * | 2010-09-30 | 2012-04-05 | Google Inc. | Image-based key exchange |
US20120084846A1 (en) * | 2010-09-30 | 2012-04-05 | Google Inc. | Image-based key exchange |
US8463239B1 (en) * | 2011-02-11 | 2013-06-11 | Sprint Communications Company L.P. | Secure reconfiguration of wireless communication devices |
US20140366101A1 (en) * | 2012-02-09 | 2014-12-11 | Sharp Kabushiki Kaisha | Informaton processing system, information processing device, and communication connection method |
US10462127B2 (en) | 2012-02-09 | 2019-10-29 | Sharp Kabushiki Kaisha | Information processing system, information processing device, and communication connection method |
US20160314294A1 (en) * | 2015-04-24 | 2016-10-27 | Hand Held Products, Inc. | Secure unattended network authentication |
US20180101675A1 (en) * | 2015-04-24 | 2018-04-12 | Hand Held Products, Inc. | Secure unattended network authentication |
US10860706B2 (en) * | 2015-04-24 | 2020-12-08 | Hand Held Products, Inc. | Secure unattended network authentication |
CN108108595A (en) * | 2017-12-29 | 2018-06-01 | 晨星半导体股份有限公司 | The method and system authorized to the software in electronic equipment |
US10949506B2 (en) * | 2017-12-29 | 2021-03-16 | Xiamen Sigmastar Technology Ltd. | Method and system for authorizing software in electronic device |
CN108108595B (en) * | 2017-12-29 | 2023-03-28 | 星宸科技股份有限公司 | Method and system for authorizing software in electronic equipment |
BE1028540B1 (en) * | 2020-08-27 | 2022-10-05 | Zebra Technologies | METHODS AND SYSTEMS FOR SETTING UP A BI-DIRECTIONAL COMMUNICATION LINK BETWEEN A HOST DEVICE AND A BARCODE READER |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9013729B2 (en) | Mobile terminal apparatus and mobile print application | |
US10033903B2 (en) | Image forming apparatus supporting near field communication (NFC) function and method of setting an image job using NFC device | |
US8496180B2 (en) | Managing mobile device interactions using barcodes | |
US9356882B2 (en) | Streamlined system for the transmission of network resource data | |
US8108317B2 (en) | System and method for restricting access to a terminal | |
US8711407B2 (en) | Method for generating optical codes for a print-context | |
US20070101403A1 (en) | Provisioning a wireless link for a wireless scanner | |
US10003971B2 (en) | Compartmentalized multi-factor authentication for mobile devices | |
KR20150014316A (en) | Image forming apparatus and near field communication (NFC) device supporting function of NFC and method for performing authentication thereof | |
EP2300950B1 (en) | System and method for configuring a scanner | |
US20120194854A1 (en) | Automatic printer setup system | |
US20160037347A1 (en) | Method for granting a plurality of electronic communication devices access to a local area network | |
US7076238B2 (en) | Wireless communication system exchanging encrypted data | |
US20200153980A1 (en) | System and method using matrix barcode information to process documents | |
JP2007328663A (en) | Image forming apparatus and control method thereof | |
US20100306840A1 (en) | Document processing automated system and image forming apparatus | |
CN108319877B (en) | Information reading terminal using coding of external token | |
US7823779B2 (en) | Complimentary optical image and radio frequency signal processing | |
JP2010055522A (en) | Authentication control device, authentication control method, and program | |
US20080031445A1 (en) | Key Binding Method and Applications Capable of Dynamic Key Generation | |
US8249209B2 (en) | Synchronous one-bit interface protocol or data structure | |
JP2003216915A (en) | Information transmission equipment and information transmission method | |
US20240267729A1 (en) | Pre-Authentication for Short-Range Wireless Communications with Peripheral Devices | |
CN108571236B (en) | Intelligent authentication system and electronic key thereof | |
JP2006142503A (en) | Image processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERMEC IP CORP., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KUBLER, JOSEPH J.;REEL/FRAME:017194/0800 Effective date: 20051023 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |